浏览全部资源
扫码关注微信
信息工程大学数学工程与先进计算国家重点实验室,河南 郑州 450001
[ "马猛(1986-),男,河南南阳人,信息工程大学硕士生,主要研究方向为流密码分析、概率统计在密码学中的应用。" ]
[ "赵亚群(1961-),女,江苏淮安人,信息工程大学教授、硕士生导师,主要研究方向为密码基础理论及概率统计应用。" ]
网络出版日期:2016-06,
纸质出版日期:2016-06-25
移动端阅览
马猛, 赵亚群. 简化版Trivium算法的线性逼近研究[J]. 通信学报, 2016,37(6):185-191.
Meng MA, Ya-qun ZHAO. Research on linear approximations of simplified Trivium[J]. Journal on communications, 2016, 37(6): 185-191.
马猛, 赵亚群. 简化版Trivium算法的线性逼近研究[J]. 通信学报, 2016,37(6):185-191. DOI: 10.11959/j.issn.1000-436x.2016108.
Meng MA, Ya-qun ZHAO. Research on linear approximations of simplified Trivium[J]. Journal on communications, 2016, 37(6): 185-191. DOI: 10.11959/j.issn.1000-436x.2016108.
针对初始化轮数为288个时钟的简化版Trivium算法(又称2轮Trivium)进行了线性逼近研究,设计了搜索
The linear approximations of simplified Trivium with the initialization of 288 clocks(2-round Trivium) was studied.An algorithm was designed to search optimal linear approximations.Moreover
a method was presented to conduct a linear approximation of 2-round Trivium by approximating the first round equation which involved the key bits
CANNIÀRE C , PRENEEL B . Trivium specifications [EB/OL ] . http://www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf http://www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf , 2007 .
MAXIMOV A , BIRYUKOV A . Two trivial attacks on Trivium [C ] // 2007 : 36 - 55 .
DINUR A , SHAMIR A , . Cubic attacks on tweakable black box polynomials [C ] // Advances in Cryptology-EUROCRYPT 2009 . 2009 : 278 - 299 .
STANKOVSKI P , . Greedy distinguishers and nonrandomness detectors [C ] // INDOCRYPT 2010 . 2010 : 210 - 226 .
HOJSÍK M , RUDOLF B . Differential fault analysis of Trivium [C ] // FSE 2008 . 2008 : 158 - 172 .
HU Y P , GAO J T , LIU Q , et al . Fault analysis of Trivium [C ] // Designs,Codes and Cryptography . 2011 : 289 - 311 .
AVIJIT D , GOUTAM P . Deterministic hard fault attack on trivium [C ] // Advances in Information and Computer Security . 2014 : 134 - 145 .
PRAKASH D , AVISHEK A . Improved multi-bit differential fault analysis of trivium [C ] // Progress in Cryptology . 2014 : 37 - 52 .
TURAN M S , KARA O . Linear approximations for 2-round Trivium [C ] // Workshop on the State of the Art of Stream Cipher (SASC2007) . Bochum , 2007 : 22 - 31 .
贾艳艳 , 胡予濮 , 杨文峰 , 等 . 2轮Trivium的多线性密码分析 [J ] . 电子与信息学报 , 2011 , 33 ( 1 ): 223 - 227 .
JIA Y Y , HU Y P , YANG W F , et al . Linear cryptanalysis of 2-round Trivium with multiple approximations [J ] . Journal of Electronics &Information Technology , 2011 , 33 ( 1 ): 223 - 227 .
孙文龙 , 关杰 , 刘建东 . 针对简化版Trivium算法的线性分析 [J ] . 计算机学报 , 2012 , 35 ( 9 ): 1890 - 1896 .
SUN W L , GUAN J , LIU J D . Linear cryptanalysis of simplified Trivium [J ] . Chinese Journal of Computers , 2012 , 35 ( 9 ): 1890 - 1896 .
欧智慧 , 赵亚群 . 2 轮 Trivium 的线性逼近研究 [J ] . 计算机工程 , 2013 , 39 ( 11 ): 31 - 34 .
OU Z H , ZHAO Y Q . Study on linear approximation of 2-round Trivium [J ] . Computer Engineering , 2013 , 39 ( 11 ): 31 - 34 .
李世取 , 曾本胜 , 廉玉忠 , 等 . 密码学中的逻辑函数 [M ] . 北京 : 中软电子出版社 , 2003 : 254 - 255 .
LI S Q , ZENG B S , LIAN Y Z , et al . Logical functions in cryptography [M ] . Beijing : Software and Electronic PressPress , 2003 : 254 - 255 .
DOUGLAS R , STINSON STINSON . 密码学原理与实践 [M ] . 北京 : 电子工业出版社 , 2010 : 123 - 124 .
DOUGLAS R , STINSON . Cryptography theory and practice [M ] . Beijing : Publishing House of Electronics IndustryPress , 2010 : 123 - 124 .
丁存生 , 肖国镇 . 流密码及其应用 [M ] . 北京 : 国防科学出版社 , 1994 : 28 - 29 .
DING C S , XIAO G Z . Stream cipher and its applications [M ] . Beijing : National Defense Industry PressPress , 1994 : 28 - 29 .
0
浏览量
902
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构